What’s the most expensive thing you can do with a piece of data? “Throw it out,” said Douglas Brockett, the President at the data protection and scale-out data storage vendor StorageCraft in a recent DATAVERSITY® interview. Yet, many enterprises may be concerned that they won’t have the ability to keep all their potentially valuable data […]
Healthcare Companies Struggle to Comply with GDPR Data Privacy Regulations
Click to learn more about author Stuart Tarmy. Automated Data Discovery must come first and is essential for compliance. The upcoming EU (European Union) GDPR (General Data Protection Regulation) prescribes large penalties and fines for non-compliance on all companies that conduct business with consumers in the EU. The healthcare industry, which includes managed healthcare, pharmaceutical, medical […]
Data Management and Analytics Trends Changing the Data World
Click to learn more about author Andrew Brust. What’s going on in the data world right now, and how will it impact the market in 2018? There are the obvious, banner headlines, of course: AI is everywhere and will change everything; Enterprises continue to move their infrastructure – and data – to the Cloud; GDPR […]
So, What is a Data Protection Impact Assessment and Why Should Organizations Care?
Click to learn more about author Richard Macaskill. The first two posts in this series on GDPR are: So, What is GDPR and Why Should Database Administrators Care? So, What is GDPR, and Why Should Your Customers Care? If you’ve read anything about the upcoming General Data Protection Regulation (GDPR), you’ll probably have seen the phrase […]
Five Information Technology Trends to Shape Data Protection in 2018
by Angela Guess According to a recent press release, “Asigra Inc., a leading cloud backup, recovery and restore software provider since 1986, today announced five information technology trends expected to impact data protection infrastructure and business outcomes in 2018. Like other technology segments, data protection has not been sheltered from the evolution of technology which […]
Infographic: Big Gaps Emerge Between Countries on Attitudes Towards Data Protection in the Cloud
by Angela Guess A recent press release reports, “Gemalto, the world leader in digital security, can today reveal that while the vast majority of global companies (95%) have adopted cloud services[1], there is a wide gap in the level of security precautions applied by companies in different markets. Organizations admitted that on average, only two-fifths […]
Commvault Powers New HPE GreenLake Backup Solution to Bring Data Protection to Customers
by Angela Guess A new press release states, “Commvault, the global leader in enterprise backup, recovery, archive and the cloud, today announced that its Commvault Data Platform has been selected by Hewlett Packard Enterprise (HPE) to power its new HPE GreenLake Backup solution. Available today and managed through HPE’s outcome-based flexible IT consumption service, Commvault […]
Killing Anonymity: The Question of Data Privacy
Click to learn more about author Cathy Nolan. Maybe we should ask, “who or what killed anonymity?” The question being debated over and over again is “have we given away our privacy for convenience and security?” It would appear that the answer is “yes”. Some of our privacy we give away without even knowing it, but […]
Removing Barriers to Free Flow of Data – Council of the EU Decides Its Position
by Angela Guess According to a recent press release, “The EU is developing new rules to allow non-personal data to move freely and easily across country borders. Member states’ ambassadors (Permanent Representatives Committee) today agreed on a mandate for the presidency to launch negotiations with the European Parliament on the proposal, which aims to boost […]
HyTrust Announces New Solution to Discover, Classify and Protect Sensitive Workload Data
by Angela Guess According to a recent press release, “HyTrust, Inc. is bolstering its offerings of workload security with the release of CloudAdvisor, a new product which empowers companies to proactively identify risks to sensitive data and protect it against inadvertent exposure, data loss, malicious and careless users, malicious activity, and regulatory non-compliance. Seamlessly deployed […]